ocdtrekkie

twtxt.net

No description provided.

Recent twts from ocdtrekkie

@abucci@anthony.buc.ci Whether warning before or after the date is somewhat immaterial, except it slides the sysadmin window even narrower, for no good reason. Google’s already aggressively forced everyone to a 12 month deadline. Not everything supports Let’s Encrypt. And so every year we have a window where I have to rush around and update all the certs before the expiration date, but if I start the process too soon, then I am doing it every eleven months, because of that absolute 12 month cap.

And again, there’s nothing inherently less secure about a 13 month old cert than a 12 month old cert. About 99% of certificate behavior is security theater and Google flexing it’s ability to force everyone to do what it says.

⤋ Read More

@abucci@anthony.buc.ci I think TLS is fine. I think PKI is a crock of garbage, because most participants in PKI are garbage, and Google has complete capture of it and makes decisions that work best for it, and not the real world.

Ultimately what I think should happen for certificate expiration is browsers should soft-warn for like a week or two after expiry, with like a yellow address bar, as opposed to trying to block navigation. The risk of an expired cert just doesn’t justify browser behavior.

⤋ Read More

@abucci@anthony.buc.ci I literally had to fix an outage this weekend caused by a weird certificate. Not external facing, but the security risk caused by it was nonexistent, and yet, it was implemented as a requirement and caused random unexpected breakage when it expired itself.

⤋ Read More
In-reply-to » (#x77j6aq) @prologic To be fair, that both predates Sandstorm (circa 2014), and considering you've tried it recently and still spun up your own corporate infrastructure, demonstrates it's not ready to meet your needs even today.

@prologic@twtxt.net I mean I wrote https://github.com/sandstorm-io/sandstorm-error-collector in an evening, but I’m pretty well-versed in working within vagrant-spk at this point, and I knew where to pull most examples of what I was building quickly. (Also with PHP I don’t have to write my own web server…)

⤋ Read More

@abucci@anthony.buc.ci What I’ve learned in production is the apps need to be built or heavily modified to truly support object capabilities. We’ve packaged numerous apps for Sandstorm, but the best experience is still apps written to work in that environment, even if they aren’t as feature-heavy.

⤋ Read More

@prologic@twtxt.net To be fair, that both predates Sandstorm (circa 2014), and considering you’ve tried it recently and still spun up your own corporate infrastructure, demonstrates it’s not ready to meet your needs even today.

I would probably love your top bullet points on what Sandstorm would’ve needed to have or do to meet your business infra needs.

⤋ Read More
In-reply-to » (#tnbwxta) @prologic hmmm, I feel you are angry so I won't play as devil's advocate. What I can add, something controversial, is that those huge companies like power and controlling who can access to the info is a source of power.

@prologic@twtxt.net I think the OSI positions are paid positions via memberships/donations. Which is to say, the status quo is perfectly sustainable… for the OSI.

I had recent conversations with both the OSI’s Executive Director and Standards Director, and both conversations convinced me the OSI does not remotely care about sustainable open source.

⤋ Read More

@kt84@twtxt.net More than likely if a class action settlement happens, anyone who can allege they had their code on GitHub during the span of time Microsoft was training Copilot will be eligible, which would include anyone who deleted their repos when Microsoft first showed it off.

⤋ Read More
In-reply-to » (#tnbwxta) @prologic hmmm, I feel you are angry so I won't play as devil's advocate. What I can add, something controversial, is that those huge companies like power and controlling who can access to the info is a source of power.

The problem is the OSI considers this working-as-intended.

⤋ Read More

@prologic@twtxt.net I find the top purpose for corporate VPN providers is low-impact legal offenses involving torrenting: It’s not necessarily about the VPN provider not ratting you out, but about being enough of a hassle to uncloak you that by the time the legal process to do so has ramped up, the VPN provider has dumped their logs anyways. Serious crimes, governments are going to act a lot faster, and get the response they need quickly, but for the low level stuff it’s more civil law nonsense a VPN company in the middle will befuddle the process.

⤋ Read More

@abucci@anthony.buc.ci Interestingly enough, Signal has announced plans to deprecate SMS/MMS support entirely. So even if I had a phone which could tamper with my text messages, Signal soon won’t anyways.

Since I’ve solely installed Signal to talk to the Yarn social Signal group, and that’s not a sensitive communication, it doesn’t bother me if it’s compromised very much.

⤋ Read More

@mckinley@twtxt.net FWIW, spam on IRC is really, really prevalent, and IRC has limited systems to handle it. I know they’ll let you cloak your info with regards to other users seeing it, but trusting them with it is somewhat important to them managing the server.

⤋ Read More